EID 100 Lecture Notes - Lecture 4: Xcode, Big Data, Mark Zuckerberg
Document Summary
Note: next week, class will be in the launch zone! Thieves are constrained by the physical aka location (a thief needs to be physically at your house to break into it) No more physical constraints - physically strong. Governments want to make them legally weak by creating a backdoor - a key that allows them to access the information as they need or want. They want to ensure that they can get into any lock. When hackers hack into computers, they aren"t deciding exactly what computers to hack. Instead, they"re using software to brute force thousands of password combinations into thousands of computers at once. Safebox, insurance, cameras, monitor it, bury it. You wouldn"t just use one method or one layer of security. Similarly, you wouldn"t just use one layer of security for your digital goods. If you find out about the person, it makes it very easy -> social engineering.